Pass the Cisco Cisco Certified DevNet Professional 350-901 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

What are two principles according to the build, release, run principle of the twelve-factor app methodology?

(Choose two.)

Options:

A.

Code changes are able to be made at runtime.


B.

Separation between the build, release, and run phases.


C.

Releases should have a unique identifier.


D.

Existing releases are able to be mutated after creation.


E.

Release stage is responsible for compilation of assets and binaries.


Expert Solution
Questions # 62:

A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the

components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all

options are used.

Question # 62


Expert Solution
Questions # 63:

Refer to the exhibit.

Question # 63

Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

Options:

A.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=1&page- size=15


B.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=15


C.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=30


D.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=30


Expert Solution
Questions # 64:

Refer to the exhibits which show the documentation associated with the create port object API cafl in Cisco Firepower Threat Defense, and a cURL command. Which data payload completes the cURL command to run the APi call?

A)

Question # 64

B)

Question # 64

C)

Question # 64

D)

Question # 64

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 65:

Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCONF. The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.

Question # 65


Expert Solution
Questions # 66:

A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?

Options:

A.

Implement rate limiting on the client side.


B.

Implement rate limiting on the client and server sides.


C.

Do not enforce any rate Imiting


D.

Implement rate limiting on the server side.


Expert Solution
Questions # 67:

DRAG DROP

Question # 67

Question # 67

Refer to the exhibit. A system administrator has installed a Linux-based alarm system in their home that can execute a Bash shell script when an intruder is detected. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a chat-ops script that will notify of alarms via the Webex Teams REST API. Not all code snippets are used.

Question # 67


Expert Solution
Questions # 68:

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

Options:

A.

URI to which the authorization server will send the user-agent back when access is granted or denied


B.

list of the API resources that the application is requesting to access


C.

secret that was generated by the authorization server when the application registered as an OAuth integration


D.

list of scopes that correspond to the API resources to which the application is requesting to access


E.

name of the application under which the application registered as an OAuth integration


Expert Solution
Questions # 69:

Refer to the exhibit.

Question # 69

A kubeconfig file to manage access to Kubernetes clusters is shown. How many Kubernetes clusters are defined in the

file, and which cluster FS accessed using username/password authentication rather than using a certificate?

Options:

A.

three dusters; scratch


B.

three clusters: development


C.

two dusters; development


D.

two clusters: scratch


Expert Solution
Questions # 70:

Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

Options:

A.

Event


B.

Multivendor


C.

Integration


D.

Intent


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions